Analysis

  • max time kernel
    1352701s
  • max time network
    29s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    05-10-2021 13:24

General

  • Target

    commerzbank.apk

  • Size

    8.8MB

  • MD5

    4bab607247feb6002ac4e3d31ac0bef7

  • SHA1

    e1f7d9b622b7e46706287ac540e92d0bb6eea422

  • SHA256

    da61bb04b91120fab02e374d6f4001728dc5736c4e3ac011841fb1523d3ed3be

  • SHA512

    77f612a1f6a3d32d5c7d732dc3b6509852c766192f8f2c2d8d259fec87860caeb9712e4bfd9114b82f515915c7f55f17664bc3bd513cfc1942ee1a7d90a146f5

Malware Config

Signatures

  • Hydra

    Android banker and info stealer.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.ixpwrffz.cvbpkal
    1⤵
    • Loads dropped Dex/Jar
    PID:3674

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads